In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. The proposed concept of involvement of hybrid algorithms is highly secure and technologically feasible. It is a unique algorithm which may be used to minimize the security threats over the clouds. The computed results are presented in the form of tables and graphs.
The current research aims to know the extent of the impact of performance evaluation in its dimensions as an explanatory variable in the behavioural and attitudinal work outputs with its dimensions as a response variable in order to reach appropriate solutions through which the University of Fallujah seeks to achieve its goal in the process of diagnosing the axes of strength and to benefit from them in the process of strengthening the status and sobriety of the academic position of the professor and the researcher relied on The descriptive and analytical approach in carrying out this study, and data was collected from university professors, including leaders, heads of departments and divisions, who numbered (97) teachers. And fie
... Show MoreThe aim of this work was to develop and validate a rapid and low cost method for estimation of ibuprofen in pharmaceutical suspensions using Reverse-Phase High Performance Liquid Chromatography. The proposed method was conducted and validated according to International Conference on Harmonization (ICH) requirements. The chromatographic parameters were as follows: column of octyldecylsilyl C18 with dimensions (150 × 4.6) mm, mobile phase composed of acetonitrile with phosphoric acid with a ratio of 50 to 50 each using isocratic mode, flow rate of 1.5 mL/min and injection volume of 5 μL. The detection was carried out using UV detector at 220 nm. The method was validated and showed short retention time for ibuprofen peak at 7.651 min, wit
... Show MoreThe current research aims to identify: 1) the challenges facing blended education from the point of view of teachers of students with disabilities. 2) The challenges facing blended education from the point of view of teachers of students with disabilities according to the gender variable (males-females). 3) The challenges facing blended education from the point of view of teachers of students with disabilities, according to the academic qualifications of graduates
(institute-bachelors-masters). 4) The challenges facing blended education from the point of view of male and female teachers, according to the functional service period with students with disabilities (less than 8 years - from 9 to 15 years - 16 years and above). 5) the
... Show MoreThe development of a new, cheap, efficient, and ecofriendly adsorbents has become an important demand for the treatment of waste water, so nano silica is considered a good choice. A sample of nanosilica (NS) was prepared from sodium silicate as precursor and the nonionic surfactant Tween 20 as a template. The prepared sample was characterized using various characterization techniques such as FT-IR, AFM, SEM and EDX analysis. The spectrum of FTIR confirms the presence of silica in the sample, while SEM analysis of sample shows nanostructures with pore ranging (2-100nm).The adsorptive properties of this sample were studied by removing Congo red dye (CR) from aqueous solution. Batch experimental methods were carried o
... Show MoreThe heritage of Imam Ali bin Abi Talib (peace be upon him) replete with Arabic Library, and proud of human civilization, and is one of the Amaadz Islamic culture, but specimens of the world's masterpieces in timeless morality and measure and in thought, conscience and in the performance and literature.
Terrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro
... Show MoreThe research aims to introduce the elders of Imam Al-Ala who died in the year 761 AH. The study showed the prominent role of women in the eighth century AH in the sciences in general and in the hadith in particular. The woman did not depart from the call of divine education in the Almighty saying: Read in the name of your Lord who created * created mankind * created mankind * And your Lord, the Most Generous, who taught with the pen * taught man unless he knows the captive of verses 1-5.
Families in that era had a prominent role in this concern, especially parents. They were attending boys and girls since their childhood, the lessons of scholars, and the benefit of science, and they were
This study aims at investigating the partial Islamic rules of preparing and distributing cartoons in order to issue an overall Islamic rul. To reach an end, descriptive and analytical approaches are adopted to clarify the nature of cartoons and other related concepts. The researcher, as well, with reference to verses of the Holy Quran, tradition (Hadith) and Islamic jurists, adopts a deductive approach to issue Islamic rules related to the industry of cartoons and it's distribution
The study consists of three sections. The first Section addresses the following issues: Definition animation; and related wordy. The second Section: Origin of Cartoon's history and it's negative and positive effects. The third Section: Islamic rules related
Dada la importancia de la gramática en las lenguas hemos tratado en esta investigación manifestar la importancia de la posición del adjetivo en la lengua castellana y hacer una simple comparación con la lengua inglesa y la lengua árabe.
Los comportamientos de los adjetivos en lo referente a su posición respecto del sustantivo no siguen una fórmula fija. En esta cuestión “no se trata de leyes, sino de tendencias”, como dice Gili Gaya1, la inmensa mayoría de los adjetivos del español son susceptibles de ser colocados antes o después del sustantivo al que sirvan de adjunto. Las formulaciones sobre el orden Sust.+Adj. o el orden Adj.+Sust., por muy genéricas que sean, sufren excepciones,según las preferencias contextualiz
The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.